Data Security Breach Paper

Decent Essays
Where Companies have gone wrong in the past.

Unfortunately being PCI DSS compliant does not always guarantee that your data is secure. There are numerous cases in which data security breaches have had companies in the headlines for reason they wish they weren’t. During this case study report we will discuss two such breaches in detail and outline where the companies went wrong.

The first company is Heartland Payment Systems (HPS), this company hit the headlines in January of 2009 when they became victim to one of the largest data security beaches in U.S. history. Although the actual number of credit card details stolen has never been confirmed, it was said to be in the tens of millions. This was carried out over a four-month period when HPS was processing over one hundred million transactions per month. It is surprising to hear that only two weeks before this malware attack took place, HPS were audited and achieved accreditation of being PCI Compliant by their Qualified Security Assessor (QSA). (Hays, 2012).
HPS had always prided
…show more content…
When this happened HPS immediately identified and rectified the issue, or so they thought. In May 2008 the malware managed to move into the payment processing network without being detected. It wasn’t until October 2008 when one of the major card brands highlighted some information that they thought was a potential issue, that HPS decided to increase the investigation by hiring three different forensics firms to analyse their IT Security. To their relief all three firms reports came back saying that the IT Security Network was free of malware. HPS believed they were malware free until their own staff members found the malware four months later.
Since this breach HPS have increased IT Security by implementing new policies, such as:
· Encrypting cardholder data from the beginning of the transaction, right to the end of the

Related Documents

  • Improved Essays

    These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members.” The information that was hacked included: names, date of birth, social security numbers, medical ID numbers, street and e-mail addresses, employment and income information. No medical information was stolen, so this case was not ruled by Health Insurance Portability and Accountability Act (HIPAA). The investigation revealed the hackers used the computer…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The Equifax disaster points to a much bigger problem. -Rhetorical Analysis This is a rhetorical analysis of the article “The Equifax disaster points to a much bigger problem” written by Herbert Lin. Let us start with the writer himself; he is a senior research scholar for cyber policy and security at the Center for International Security and Cooperation (CISAC) and Hank J. Holland fellow in Cyber policy and Security at the Hoover Institution both of which are located at Stanford University.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In 1776 the founding fathers signed the Declaration of Independence to free themselves from the tyrant King George of Great Britain. This caused a war of independence that freed the people of the United States from an unfair government, but left them in need of leadership. After several failed attempts the leaders of the new nation formed a government that would be free from tyranny. The Founders wrote the constitution to limit the powers of the government to insure that the government would not create a new tyrant.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Answer. Yes, Target story does indeed follow the general “ATP kill chain” attack model as clearly elaborated upon in the case study. Attackers started by performing“Reconnaissance”over one of Target’s external heating and ventilation providers, Fazio Mechanical Servicesprobably after prior deep investigation to detectan easy loophole to infiltrate Target’s network for its malicious objectives. Also,Fazio relied onfree version of a security software called, “Malwarebytes Anti-Malware”, whose license explicitly prohibited corporate use; which is a fineexample of Overreliance on knowledge versus intelligence.…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Some important data breach notification information: “Breach of the security of the system" means the unauthorized access and acquisition of unencrypted and unredacted computerized data that compromises the security or confidentiality of personal information maintained by an individual or entity as part of a database of personal information regarding multiple individuals and that causes, or the individual or entity reasonably believes has caused, or will cause, identity theft or other fraud to any resident of the Commonwealth.” Personal information is: First initial and last name combined with a social security number, driver’s license information, account numbers, financial information, credit card information, etc. If there is a data breach…

    • 261 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    PCI Compliance Paper

    • 555 Words
    • 3 Pages

    PCI compliance was first introduced in 1999 by Visa, Inc., in the form of the Cardholder Information Security Program (CISP). CISP was developed as Visa’s way to fight rampant cybercrime, which left credit card companies responsible for fraudulent purchases. (Search Security Staff, 2013) However, companies accepting credit transactions did not adopt the standards provided by CISP because they were quite different from the standards presented by other card companies like Discover, MasterCard, and American Express. In December 2004, the five major credit card lenders joined together to create a uniform set of standards called the Payment Card Industry Data Security Standard (PCI DSS).…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is important to know and identify when and how the breach occurred in order to accurately determine who was affected in the breach. Once the breach has been validated, the company needs to assign a manager who will handle the incident and have a response team ready in order to mitigate the problem. This team should handle all actions such as legal, IT, finance, risk management, and even media relations (Privacy Technical Assistance Center, 2012). If the authorities or law enforcement needs to be involved in the breach, then the team will determine whether they need to be contacted for further investigation. Once all the necessary information has been recovered, it is to determine whether the parties involved should be notified and what needs to be done in order to accommodate the persons involved, such as free credit report for a year.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Equifax Fraud

    • 102 Words
    • 1 Pages

    Equifax says problems with an online customer "Help" page were caused by a vendor's software code. The company is trying to reassure people there was not bee another cyber attack on its systems. Earlier, Equifax said it had disabled its credit report assistance page after reports that another part of its website had been hacked.…

    • 102 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    TJX & Heartland – Breach Impact Facts on the case study In August year 2008, eleven individuals were accused of the burglary of more than 40 million credit and plastic numbers from the following stores: T. J. Maxx, Marshall’s, Barnes and Noble, OfficeMax, and other significant retailers. Engineering by PC programmer Albert Gonzalez, the case study stays as one of the biggest cheats of MasterCard data ever. The Heartland case was like the TJX case. Somewhere around the year 2007 and 2009, the information break included the Heartland Payment Systems, the fifth biggest charge processor in the entire United States.…

    • 1208 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    I, along many people have wondered where and who does spam comes from, who is buying this merchandise advertised in our junk folder like Viagra, who is profiting from sending these spam emails or even if these drugs are real or ineffective. Brian Krebs, founder of the award winning cybersecurity website, krebsonsecurity.com takes us into the dark world of hacking and spamming. He explains a lot of the hacking and spamming comes from Russia and that they are the true “spam nation.” McAfee, a large antivirus company detected 14 million new pieces of malware in the first quarter of 2013 alone. Krebs mainly focuses on Russian hackers, Igor “Desp” Gusev and Dmitry “SaintD” Stupin who are co-administrators of SpamIt and GlavMed which were the world…

    • 967 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    From 2012 -2016, Businesses – Other (BSO) industry has a total of 85% data records affected compared to any other organizations. Businesses - Retail/Merchant (BSR) were at 5%, Government (GOV) at 2%, Medical (MED) at 1%, Businesses - Financial/Insurance Services (BSF) at 7% and Education (EDU) and Non-profit (NGO) organization reveals at 0%. Even though, Education and Non-profit organization resulted at 0% that doesn’t mean that these two organizations had been spared from data breaches. Their overall data records breached were 4,207,097 and 312,462 respectively. The result was very much lower that the average were only in the range of 62,492 to 841,419 compared to other organization’s million average of data records being breached in the last five years.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Cyber Security Issues

    • 1272 Words
    • 6 Pages

    Only in the first half of 2002, more than 180,000 internet based attacks were taken in commercial area [7]. The well known attack in business happened in 2011 on Citigroup, one of the most famous credit card companies in the world, and through this issue thousands of customers lost their private information stored in company’s database including sensitive data such as e-mail addresses and postcode numbers, furthermore, these information losses would lead fraud risks for card users in the future [8]. Another example, eBay, one of the world biggest E-commerce companies, encountered a much more serious user data leakage including losing account passwords in 2013 and from eBay’s claim, 145 millions customers faced risks in their accounts, then, after this attack, eBay’s stock waved in one day from beginning decrease then back to normal finally [9]. Similarly, offline retailers could be hacked as well. Supervalu, US supermarket chain, lost its customer’s credit data after threaten in 2014.…

    • 1272 Words
    • 6 Pages
    Superior Essays